Showing 11,141 - 11,160 results of 19,511 for search '"algorithm"', query time: 0.12s Refine Results
  1. 11141

    Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain by Xuewang ZHANG, Zhihong LI, Jinzhao LIN

    Published 2022-08-01
    “…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
    Get full text
    Article
  2. 11142

    A Computational Realization of a Semi-Lagrangian Method for Solving the Advection Equation by Alexander Efremov, Eugeniya Karepova, Vladimir Shaydurov, Alexander Vyatkin

    Published 2014-01-01
    “…Performance of a sequential algorithm and several parallel implementations with the OpenMP and CUDA technologies in the C language has been studied.…”
    Get full text
    Article
  3. 11143

    Low pilot overhead parametric channel estimation scheme for RIS-assisted mmWave MIMO systems by LI Shuangzhi, YANG Ruiqi, GUO Xin, HUANG Sai

    Published 2024-09-01
    “…Then, a non-iterative channel estimation algorithm was derived using tensor canonical polyadic decomposition with Vandermonde structure constraints. …”
    Get full text
    Article
  4. 11144

    Effect of Learning Rate on the Recognition of Images by M. Hamed, A. El Desouky

    Published 1996-01-01
    “…The back propagation technique is considered. A computer algorithm is deduced and applied. In this work, the synthetic textures are generated. …”
    Get full text
    Article
  5. 11145

    Low-hit frequency-hopping communication systems for power Internet of things random access by Shu DU, Mei MA, Bo ZHAO, Qi ZENG, Xing LIU

    Published 2023-01-01
    “…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
    Get full text
    Article
  6. 11146

    Analysis and Parameter Optimum of a New 4-DOF 4PPaRR Parallel Mechanism by Huiping Li, Feng Ou

    Published 2019-07-01
    “…Then a performance index is defined in order to analyze the rotational capacity of 4PPaRR parallel mechanism, The scale optimization of parallel mechanism size is carried out based on Grasshopper Optimization Algorithm(GOA)in the end. The research results show that the 4PPaRR parallel mechanism has larger workspace and rotation capability. …”
    Get full text
    Article
  7. 11147

    Enhancing the Efficiency and Accuracy of MLFMA-PO Hybrid Method for Analyzing Electrically Large Objects by Hao Ding, Yong Zhang, Hai Lin

    Published 2015-01-01
    “…An enhanced hybrid technique combining the multilevel fast multipole algorithm (MLFMA) and the physical optics (PO) is presented for analyzing scattering and radiation by electrically large structures. …”
    Get full text
    Article
  8. 11148

    Sculpture 3D Modeling Method Based on Image Sequence by Xiaofei Liu

    Published 2021-01-01
    “…This thesis first introduces the basic principles of model-based image sequence coding technology, then discusses in detail the specific steps in various implementation algorithms, and proposes a basic feature point calibration required in three-dimensional motion and structure estimation. …”
    Get full text
    Article
  9. 11149

    RESEARCH ON SPEED AND PRESSURE CONTROL STRATEGY OF STABLE SWITCH ABOUT FOREPOLING EQUIPMENT by LUAN LiJun, ZHAO HuiMeng, XIE Miao, LIU ZhiXiang

    Published 2017-01-01
    “…Taking into account the operational principle of forepoling equipment,and as the target to improving support efficiency and reducing the disturbance on the roof in the process of supporting,a kind of speed and pressure composition control method was presented.The control method adopts the constant pump driven directly by servo motor to replace the traditional electro-hydraulic proportional valve,and the variable structure algorithm based on the fuzzy sliding mode was used as control strategy.Theoretical analysis and experimental results show that,compared with the traditional speed and pressure control method,the control method presented in the paper can reduce concussion on the roof in the process of switching from speed control to pressure control,and can improve support efficiency.Research findings can provide a theoretical basis for the development and control strategy of forepoling equipment.…”
    Get full text
    Article
  10. 11150

    On the Principles and Decisions of New Word Translation in Sino-Japan Cross-Border e-Commerce: A Study in the Context of Cross-Cultural Communication by Gaowa Sulun

    Published 2023-01-01
    “…The results show that the algorithm in this paper achieves the best performance on both the BLEU and METEOR evaluation metrics.…”
    Get full text
    Article
  11. 11151

    Routing approach based on local topology control in cognitive radio networks by Shu-qi LIU, Yi-ming WANG, Cui-mei CUI

    Published 2016-05-01
    “…An approach of topology control and routing was proposed according to the characteristics of cogni ive radio networks,which considered multi factors optimization with fusion of primary users and secondary users.And the ap-proach took the spectrum utilization of primary users the interference from secondary users to primary users into ac-count.Then a joint link cost was defined combining the predicted cognitive link stability with the link power consump-tion.Furthermore,the local cognitive topology control routing(LCTCR)algorithm with minimizing the link cost was presented,which was used to optimize the network topology.Meanwhile,the network path was selected according to the optimized network topology.Theoretical analysis and simulation experiments show that the link power consumption and the link stability are also important parameters and need to be jointly optimized when selecting the network path.Only by doing so can it guarantee that the selected path is optimal.…”
    Get full text
    Article
  12. 11152

    PROBLEMS OF STRATEGIC MANAGEMENT OF BUSINESS PROCESSES IN THE CONTEXT OF INTEGRATED DIGITALIZATION OF HIGH-TECH INDUSTRIES by N. N. Trofimova

    Published 2020-09-01
    “…The novelty and scientific value of the work lies in the fact that the result of the study was a reasonable author’s approach to studying the specifics of the digital economy in Russian industry, as well as the development of an algorithm for identifying and solving existing problems of digitalization, taking into account the peculiarities of high-tech industries.…”
    Get full text
    Article
  13. 11153

    Substructure correlation adaptation transfer learning method based on K-means clustering by Haoshuang LIU, Yong ZHANG, Yingbo CAO

    Published 2023-03-01
    “…Domain drifts severely affect the performance of traditional machine learning methods, and existing domain adaptive methods are mainly represented by adaptive adjustment cross-domain through global, class-level, or sample-level distribution adaptation.However, too coarse global matching and class-level matching can lead to insufficient adaptation, and sample-level adaptation to noise can lead to excessive adaptation.A substructure correlation adaptation (SCOAD) transfer learning algorithm based on K-means clustering was proposed.Firstly, multiple subdomains of the source domain and the target domain were obtained by K-means clustering.Then, the matching of the second-order statistics of the subdomain center was sought.Finally, the target domain samples were classified by using the subdomain structure.The proposed method approach further improves the performance of knowledge transfer between the source and target domains on top of the traditional approach.Experimental results on common transfer learning datasets show the effectiveness of the proposed method.…”
    Get full text
    Article
  14. 11154

    Using deep learning for detecting BotCloud by Guang KOU, Guang-ming TANG, Shuo WANG, Hai-tao SONG, Yuan BIAN

    Published 2016-11-01
    “…Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. …”
    Get full text
    Article
  15. 11155

    Two-level feature selection method based on SVM for intrusion detection by Xiao-nian WU, Xiao-jin PENG, Yu-yang YANG, Kun FANG

    Published 2015-04-01
    “…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
    Get full text
    Article
  16. 11156

    Innovation of Teaching Method of Digital Media Art Based on Convolutional Neural Network by Yumei Liu

    Published 2022-01-01
    “…In order to improve the effect of digital media art teaching, this study combines the neural network algorithm to carry out the innovation of digital media art teaching resource management and teaching method innovation. …”
    Get full text
    Article
  17. 11157

    Two-Dimensional Fuzzy Spatial Relations: A New Way of Computing and Representation by Nadeem Salamat, El-hadi Zahzah

    Published 2012-01-01
    “…In this paper, we propose a method for combining fuzzy topological and directional relations. We also propose an algorithm for defuzzification of relations which provides us a binary topological and directional relation between a 2D object pair. …”
    Get full text
    Article
  18. 11158

    Research on Design and Application of National Fitness System by Shengyou Wang

    Published 2021-01-01
    “…On this basis, through the collection of users’ fitness data rating data, the data are transformed into fitness data rating matrix, and the matrix is analyzed and calculated to realize the intelligent recommendation of fitness data and complete the design of national fitness data recommendation algorithm. The test results show that the system can meet the requirements of normal use, good compatibility, and user score is high and has high practical application value.…”
    Get full text
    Article
  19. 11159

    Cryptocurrency Financial Risk Analysis Based on Deep Machine Learning by Si Chen

    Published 2022-01-01
    “…Development of deep learning algorithms opens the horizons for the development of electronic businesses that use digital currency. …”
    Get full text
    Article
  20. 11160

    A PI-Type Sliding Mode Controller Design for PMSG-Based Wind Turbine by Jun Liu, Feihang Zhou, Chencong Zhao, Zhuoran Wang

    Published 2019-01-01
    “…Finally, the simulation results verify the correctness and effectiveness of this algorithm.…”
    Get full text
    Article